Biblio

Export 21359 results:
2000
Lee, Yeuan-Kuen, and Ling-Hwei Chen. "High Capacity Image Steganographic Model." Vision, Image and Signal Processing, IEE Proceedings 147, no. 3 (2000).
Penzar, Dražen, and Armano Srbljinović. High-Resolution Combat Models In Creative Problem-Solving – Proceedings of the 4th Conference on Modeling in Science . Rijeka: Croatian Academy of Technical Sciences: Technics and Society, 2000.
Tripp, Charles. A History of Iraq. Cambridge: Cambridge University Press, 2000.
Utasi, Á., and L. Czúni. HMM-based Unusual Motion Detection without Tracking In The 19th International Conference on Pattern Recognition. Tampa, USA, 2000.
Brooks, Doug. "Hope for the Hopeless Continent: Mercenaries." Traders: Journal for the Southern African Region (2000).
McConnan, Isabel. Humanitarian Charter and Minimum Standards in Disaster Relief In The Sphere Project. London: Oxfam Publications, 2000.
Kohl, Helmut. Ich wollte Deutschlands Einheit., 2000.
Eagleton, Terry. The Idea of Culture. Hoboken, NJ: Blackwell Publisher, 2000.
IEEE Std 1471 In IEEE Recommended Practice for Architectural Description of Software-Intensive Systems., 2000.
IEEE Std 1516-2000 - IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) — Framework and Rules. Institute of Electrical and Electronics Engineers Inc, 2000.
Alexiev, Kiril. Implementation of Hough Transform as Track Detector In International Conference on Multisource Multisensor Information Fusion ., 2000.
Suro, Roberto. "In Kosovo, an Uncertain Mission." Washington Post (2000).
Radaev, N.N.. "Increasing disaster probability prediction accuracy by taking into account heterogeneous statistical data." Automatics and Telemechanics 3 (2000).
Smith, Steve. "The Increasing Insecurity of Security Studies: Conceptualizing Security in the Last Twenty Years." In Critical Reflections on Security and Change. London: Frank Cass, 2000.
Ivanova, Petya, and Todor Tagarev. "Indicator Space Configuration for Early Warning of Violent Political Conflicts by Genetic Algorithms." Annals of Operations Research 97 (2000): 287-311.
Monitor, ISIJ. "Information Assurance Challenges." Information & Security: An International Journal 5 (2000): 131-132.
Tselkov, Veselin, and Dragomir Pargov. "Information Assurance in C4I Systems." Information & Security: An International Journal 4 (2000): 43-59.
Katzenbeisser, Stefan, and Fabien A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA: Artech House Inc, 2000.
Information Operations as an Integrating Strategy In Cyberwar 3.0: Human Factors in Information Operations and Future Conflict. Fairfax, VA: AFCEA International Press, 2000.
Krusche, Stefan, and Andreas Tolk. Information Processing as a Key Factor for Modern Federations of Combat Information Systems In NATO IST Panel Symposium on New Information Processing Techniques for Military Systems, RTO-MP-049. Istanbul, Turkey, 2000.
Monitor, ISIJ. "The Information Revolution and Post-Modern Warfare." Information & Security: An International Journal 5 (2000): 127-128.
Monitor, ISIJ. "Information Security Architecture: An Integrated Approach to Security in the Organization." Information & Security: An International Journal 4 (2000): 116.
Monitor, ISIJ. "Information Security Management Handbook." Information & Security: An International Journal 4 (2000): 117-120.
Lakov, Dimitar, and Georgi Kirov. Information Soft Computing Agents In International Conference on Automatics and Informatics’2000, October 24-26, 2000), 135-140., 2000.
Koburov, Todor. "Information Support for Decision-Making during the Kosovo Crisis." Information & Security: An International Journal 5 (2000): 86-93.

Pages